Skip to main content

A Hybrid Model for Worm Simulations in a Large Network

  • Conference paper
Intelligence and Security Informatics (PAISI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4430))

Included in the following conference series:

  • 1896 Accesses

Abstract

Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. As results, Internet and web services become core infrastructure for a company or an institute and become more and more important. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. It is difficult to find and close all security flaws in a computer system that is connected to a network. Internet worms take advantages of these security flaws, and attack a large number of hosts with self-propagating techniques.

It is quite challenging to simulate very large-scale worm attacks. This paper propose a hybrid model for large-scale simulations, and the proposed model will be both detailed enough to generate realistic packet traffic, and efficient enough to model a worm spreading through the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lala, C., Panda, B.: Evaluating damage from cyber attacks: A model and analysis. IEEE Transactions on Systems, Man and Cybernetics 31, 300–310 (2001)

    Article  Google Scholar 

  2. Center, C.C.: CERT advisories (2004), http://www.cert.org/advisories/

  3. Liljenstam, M., et al.: Simulating realistic network worm traffic for worm warning system design and testing. In: Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 24–33. ACM Press, New York (2003)

    Chapter  Google Scholar 

  4. Perumalla, K.S., Sundaragopalan, S.: High-fidelity modeling of computer netowrk worms. In: Proceedings of the 20th Annual Computer Security Applications Conference (2004)

    Google Scholar 

  5. Liu, B., et al.: A study of networks simulation efficiency: Fluid simulation vs. packet-level simulation. In: Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Comunications Societies (INFOCOM), pp. 1244–1253 (2001)

    Google Scholar 

  6. Kiddle, C., et al.: Hybrid packet/fluid flow network simulation. In: Proceedings of the Seventeenth Workshop on Parallel and Distributed Simulation (PADS’03) (2003)

    Google Scholar 

  7. Mostow, J.R., Roberts, J.D., Bott, J.: Integration of an internet attack simulator in an HLA environment. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)

    Google Scholar 

  8. Welch, D., Conti, G., Marin, J.: A framework for an information warfare simulation. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)

    Google Scholar 

  9. Breslau, L., et al.: Advances in network simulation (Expanded version available as USC TR 99-702b). IEEE Computer 33, 59–67 (2000)

    Google Scholar 

  10. Technology, O.: Opnet modeler (2001)

    Google Scholar 

  11. Yun, J.B., et al.: A scalable, ordered scenario-based network security simulator. In: Baik, D.-K. (ed.) AsiaSim 2004. LNCS (LNAI), vol. 3398, Springer, Heidelberg (2005)

    Google Scholar 

  12. Gu, Y., Liu, Y., Towsley, D.: On integrating fluid models with packet simulation. In: Proceedings of the IEEE INFOCOM (2004)

    Google Scholar 

  13. Zeng, X., Bagrodia, R., Gerla, M.: GloMoSim: A library for parellel simulation of large-scale wireless networks. In: Proceedings of the 12th Workshop on Parallel and Distributed Simulation, pp. 154–161 (1998)

    Google Scholar 

  14. Melamed, B., Pan, S., Wardi, Y.: Hybrid discrete-continuous fluid-flow simulation. In: Proceedings of ITCOM 2001, Scalability and Traffic Control in IP Networks (2001)

    Google Scholar 

  15. Moore, D., et al.: Inside the slammer worm. IEEE Security & Privacy 1, 33–39 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christopher C. Yang Daniel Zeng Michael Chau Kuiyu Chang Qing Yang Xueqi Cheng Jue Wang Fei-Yue Wang Hsinchun Chen

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Im, E.G., Kim, J.S., Noh, I.W., Jang, H.J. (2007). A Hybrid Model for Worm Simulations in a Large Network. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71549-8_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71548-1

  • Online ISBN: 978-3-540-71549-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics